  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/4032</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>MACSteg: Real-Time Voice Authentication and Deepfake Protection Using Device MAC Address Steganography</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">University of Information Technology and Communications, Biomedical Informatics College, 10066, Baghdad, Iraq </organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sanaa</given_name>
    <surname>Sanaa</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University of Information Technology and Communications, Biomedical Informatics College, 10066, Baghdad, Iraq </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Zaid Ali</given_name>
    <surname>Alsarray</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, Almamoon University Collage, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Saad Abdual Azize Abdual</given_name>
    <surname>Rahman</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Universiti Teknikal Malaysia, Faculty of Information and Communication Technology, Melaka, Malaysia </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Massila</given_name>
    <surname>Kamalrudin</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Universiti Teknikal Malaysia, Center of Research and Innovation Management, Melaka, Malaysia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mustafa</given_name>
    <surname>Musa</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The invention of deepfake applications make it possible to produce highly natural and real voice recordings which creates critical concerns about the credibility of audio telecommunications. The confirmation of the speakers’ voices became essential especially for sensitive data such as financial, healthcare, and surveillance risk management services, authentication of speakers’ voices became significantly crucial. To improve solutions to this issue, this paper presents MACSteg strategy which is a real-time, lightweight voice authentication technique by discreetly encapsulate device’s MAC address within voice file using Quantization Index Modulation (QIM) stego-technique. Unlike many traditional strategies that degrade voice quality or produces noticed jitter, MACSteg technique preserve both clarity and efficiency. Implementations showed that the hidden MAC address stayed intact in spite of some typical voice processing such as compression, while interfered signals reformed by clatter or volume variations were consistently detected. The proposed system obtained a high signal-to-noise ratio (SNR) exceeding 70 dB, illustrating that the alterations were inaudible, and maintained well in real-time submissions, giving only a processing delay of 0.01 milliseconds per each audio segment. The results indicate MACSteg’s potential as a ascendable and effective approach for safeguarding voice authenticity, especially in circumstances where verification of speaker’s voice is vital.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2026</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2026</year>
  </publication_date>
  <pages>
   <first_page>14</first_page>
   <last_page>22</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.170202</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/4032</resource>
  </doi_data>
 </journal_article>
</journal>
